LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Server
User Name
Password
Linux - Server This forum is for the discussion of Linux Software used in a server related context.

Notices


Reply
  Search this Thread
Old 02-19-2013, 09:09 AM   #16
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600

Quote:
Originally Posted by sharadchhetri View Post
I hope by this way we can achieve almost main concern of Question
Thanks for rehashing about everything I wrote here or in the posts I linked to.


Quote:
Originally Posted by sharadchhetri View Post
@schneidz , appreciate you also pointed out good thing .
I already addressed /var/log/secure and equivalent in my second post.


Quote:
Originally Posted by sharadchhetri View Post
and it is better to have something rather then nothing.
Given a correct understanding of the requirements and the way available tools match or not, the choice for selecting something less than the optimal simply becomes a question of competence.
 
Old 02-19-2013, 10:53 AM   #17
sharadchhetri
Member
 
Registered: Aug 2008
Location: INDIA
Distribution: Redhat,Debian,Suse,Windows
Posts: 179

Rep: Reputation: 23
Quote:
Originally Posted by unSpawn View Post
Thanks for rehashing about everything I wrote here or in the posts I linked to.



I already addressed /var/log/secure and equivalent in my second post.



Given a correct understanding of the requirements and the way available tools match or not, the choice for selecting something less than the optimal simply becomes a question of competence.
I do agree "the choice for selecting something less than the optimal simply becomes a question of competence".

Tools are created by us,many bugs are opened and fixed. The method always need improvisation.New idea always be appreciated so that anyone can modify and make it better.We can not 100% judge it is less than optimal,they also have some advantages.
 
Old 02-19-2013, 04:38 PM   #18
KinnowGrower
Member
 
Registered: May 2008
Location: Toronto
Distribution: Centos && Debian
Posts: 347

Original Poster
Rep: Reputation: 34
Awesome! it was very nice discussion and explanation by every participant in this post. I do really appreciate all, who spent some time to look in to the issue and explained. I will try using sudo, rootsh and the logging method suggested by sharadchhetri and then decide which one is good for my working environment. Of-course, I have to convince others as well

unSpawn, Thank you very much for your help

Once again thanks all of you guys
 
Old 02-19-2013, 06:18 PM   #19
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by KinnowGrower View Post
unSpawn, Thank you very much for your help
NP, you're welcome. After all helping is what we're here for.


Quote:
Originally Posted by KinnowGrower View Post
Of course, I have to convince others as well
What matters is the reason for changing this. I mean that if you don't have the luck to be able to use say regulatory compliance as an argument then you only have company or institutions (network) policies if any, security best practices and increased cost of maintenance if the audit trail remains broken. So what you could do is quantify as you know that's what managers need to make a decision. If like you said it's a legacy thing then trying to wean users off bad habits will be met with resistance no matter what you do. What you could do is log all access, tally how different roles use the server and devise solutions that take away their common "ease of use" and related arguments.
 
1 members found this post helpful.
Old 02-19-2013, 06:34 PM   #20
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by sharadchhetri View Post
We can not 100% judge it is less than optimal, they also have some advantages.
Maybe you can't but I can. Having had to reconstruct time lines from broken audit trails on compromised servers a couple of times taught me that. All I can do is try to pass what I've learned on to others.
 
Old 02-19-2013, 09:39 PM   #21
sharadchhetri
Member
 
Registered: Aug 2008
Location: INDIA
Distribution: Redhat,Debian,Suse,Windows
Posts: 179

Rep: Reputation: 23
Quote:
Originally Posted by unSpawn View Post
Maybe you can't but I can. Having had to reconstruct time lines from broken audit trails on compromised servers a couple of times taught me that. All I can do is try to pass what I've learned on to others.
Thanks for sharing your questions and the loopholes you highlighted . It was really a good discussion. Securing the server and make robust auditing should always be in priority . loopholes are in almost all tool or method, we have to just fill it up and improvise it with our real time scenario problems.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] How can the non-root users change their password if....... challavijay Linux - Newbie 3 07-31-2010 02:55 PM
did not find any option for root password for root user in ubuntu 9.10 linux.ab Linux - Newbie 1 03-02-2010 02:58 AM
RHEL5 Users cannot change password, but root can ggiwtc Linux - Server 2 12-10-2008 02:56 PM
How to let several users log in to the internet - without root password frank320 Fedora 4 05-25-2007 09:34 AM
Is it safe to remove root (and other users') password? simopal6 Linux - Security 11 05-19-2007 02:43 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Server

All times are GMT -5. The time now is 07:24 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration